Search results for: common bile duct exploration
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6884

Search results for: common bile duct exploration

5054 Reliability Assessment and Failure Detection in a Complex Human-Machine System Using Agent-Based and Human Decision-Making Modeling

Authors: Sanjal Gavande, Thomas Mazzuchi, Shahram Sarkani

Abstract:

In a complex aerospace operational environment, identifying failures in a procedure involving multiple human-machine interactions are difficult. These failures could lead to accidents causing loss of hardware or human life. The likelihood of failure further increases if operational procedures are tested for a novel system with multiple human-machine interfaces and with no prior performance data. The existing approach in the literature of reviewing complex operational tasks in a flowchart or tabular form doesn’t provide any insight into potential system failures due to human decision-making ability. To address these challenges, this research explores an agent-based simulation approach for reliability assessment and fault detection in complex human-machine systems while utilizing a human decision-making model. The simulation will predict the emergent behavior of the system due to the interaction between humans and their decision-making capability with the varying states of the machine and vice-versa. Overall system reliability will be evaluated based on a defined set of success-criteria conditions and the number of recorded failures over an assigned limit of Monte Carlo runs. The study also aims at identifying high-likelihood failure locations for the system. The research concludes that system reliability and failures can be effectively calculated when individual human and machine agent states are clearly defined. This research is limited to the operations phase of a system lifecycle process in an aerospace environment only. Further exploration of the proposed agent-based and human decision-making model will be required to allow for a greater understanding of this topic for application outside of the operations domain.

Keywords: agent-based model, complex human-machine system, human decision-making model, system reliability assessment

Procedia PDF Downloads 165
5053 Comparison of the Distillation Curve Obtained Experimentally with the Curve Extrapolated by a Commercial Simulator

Authors: Lívia B. Meirelles, Erika C. A. N. Chrisman, Flávia B. de Andrade, Lilian C. M. de Oliveira

Abstract:

True Boiling Point distillation (TBP) is one of the most common experimental techniques for the determination of petroleum properties. This curve provides information about the performance of petroleum in terms of its cuts. The experiment is performed in a few days. Techniques are used to determine the properties faster with a software that calculates the distillation curve when a little information about crude oil is known. In order to evaluate the accuracy of distillation curve prediction, eight points of the TBP curve and specific gravity curve (348 K and 523 K) were inserted into the HYSYS Oil Manager, and the extended curve was evaluated up to 748 K. The methods were able to predict the curve with the accuracy of 0.6%-9.2% error (Software X ASTM), 0.2%-5.1% error (Software X Spaltrohr).

Keywords: distillation curve, petroleum distillation, simulation, true boiling point curve

Procedia PDF Downloads 433
5052 Mathematical Model for Defection between Two Political Parties

Authors: Abdullahi Mohammed Auwal

Abstract:

Formation and change or decamping from one political party to another have now become a common trend in Nigeria. Many of the parties’ members who could not secure positions and or win elections in their parties or are not very much satisfied with the trends occurring in the party’s internal democratic principles and mechanisms, change their respective parties. This paper developed/presented and analyzed the used of non linear mathematical model for defections between two political parties using epidemiological approach. The whole population was assumed to be a constant and homogeneously mixed. Equilibria have been analytically obtained and their local and global stability discussed. Conditions for the co-existence of both the political parties have been determined, in the study of defections between People Democratic Party (PDP) and All Progressive Congress (APC) in Nigeria using numerical simulations to support the analytical results.

Keywords: model, political parties, deffection, stability, equilibrium, epidemiology

Procedia PDF Downloads 630
5051 An Explanatory Practice Example: The Reasons of Students Not Doing Any Extra Work

Authors: Özge Özsoy

Abstract:

Teachers usually complain that their students do not study enough to further practice the subjects they have covered in class. Teachers tend to focus on how often and hard they should study rather than finding out the main reasons why most students avoid doing any extra work to improve their skills. In this study, with the use of exploratory practice method, 40 English preparatory class students at Anadolu University will discuss this puzzle through an in-class discussion and create posters describing the reasons for and solutions to it. The overlapping data from the posters will be categorized in two sections as reasons and solutions in a final poster. The study aims at revealing the student perspective of a common puzzle that troubles many teachers.

Keywords: exploratory practice, extra work, puzzle, students, teachers

Procedia PDF Downloads 337
5050 Antiglycemic Activity of Raw Plant Materials as Potential Components of Functional Food

Authors: Ewa Flaczyk, Monika Przeor, Joanna Kobus-Cisowska, Józef Korczak

Abstract:

The aim of this paper was to collect the information concerning the most popular raw plant materials of antidiabetic activity, in a context of functional food developing production. The elaboration discusses morphological elements possible for an application in functional food production of the plants such as: common bean, ginger, Ceylon cinnamon, white mulberry, fenugreek, French lilac, ginseng, jambolão, and bitter melon. An activity of bioactive substances contained in these raw plant materials was presented, pointing their antiglycemic and also hypocholesterolemic, antiarthritic, antirheumatic, antibacterial, and antiviral activity in the studies on humans and animals. Also the genesis of functional food definition was presented.

Keywords: antiglycemic activity, raw plant materials, functional food, food, nutritional sciences

Procedia PDF Downloads 467
5049 Accurate and Repeatable Pressure Control for Critical Testing of Advanced Ceramics Using Proportional and Derivative Controller

Authors: Benchalak Muangmeesri

Abstract:

The purpose of this paper is to discuss how to test the best control performance of a ceramics. Hydraulic press machine (HPM) is the most common shaping of advanced ceramic with products, dimensions, and ceramic products mainly from synthetic powders. A microcontroller can be achieved to control process and has set high standards in the shaping of raw materials in powder form. HPM was proposed to develop a position control system that linked to the embedded controller PIC16F877 via Proportional and Derivative (PD) controller. The model is performed using MATLAB/SIMULINK and the best control performance of an HPM. Finally, PD controller results, showing the best performance as it had the smallest overshoot and highest quality using a microcontroller control.

Keywords: ceramics, hydraulic press, microcontroller, PD controller

Procedia PDF Downloads 348
5048 Earth Observations and Hydrodynamic Modeling to Monitor and Simulate the Oil Pollution in the Gulf of Suez, Red Sea, Egypt

Authors: Islam Abou El-Magd, Elham Ali, Moahmed Zakzouk, Nesreen Khairy, Naglaa Zanaty

Abstract:

Maine environment and coastal zone are wealthy with natural resources that contribute to the local economy of Egypt. The Gulf of Suez and Red Sea area accommodates diverse human activities that contribute to the local economy, including oil exploration and production, touristic activities, export and import harbors, etc, however, it is always under the threat of pollution due to human interaction and activities. This research aimed at integrating in-situ measurements and remotely sensed data with hydrodynamic model to map and simulate the oil pollution. High-resolution satellite sensors including Sentinel 2 and Plantlab were functioned to trace the oil pollution. Spectral band ratio of band 4 (infrared) over band 3 (red) underpinned the mapping of the point source pollution from the oil industrial estates. This ratio is supporting the absorption windows detected in the hyperspectral profiles. ASD in-situ hyperspectral device was used to measure experimentally the oil pollution in the marine environment. The experiment used to measure water behavior in three cases a) clear water without oil, b) water covered with raw oil, and c) water after a while from throwing the raw oil. The spectral curve is clearly identified absorption windows for oil pollution, particularly at 600-700nm. MIKE 21 model was applied to simulate the dispersion of the oil contamination and create scenarios for crises management. The model requires precise data preparation of the bathymetry, tides, waves, atmospheric parameters, which partially obtained from online modeled data and other from historical in-situ stations. The simulation enabled to project the movement of the oil spill and could create a warning system for mitigation. Details of the research results will be described in the paper.

Keywords: oil pollution, remote sensing, modelling, Red Sea, Egypt

Procedia PDF Downloads 341
5047 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies

Authors: Arun Prabhakar

Abstract:

Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.

Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling

Procedia PDF Downloads 135
5046 Low Power Consuming Electromagnetic Actuators for Pulsed Pilot Stages

Authors: M. Honarpardaz, Z. Zhang, J. Derkx, A. Trangärd, J. Larsson

Abstract:

Pilot stages are one of the most common positioners and regulators in industry. In this paper, we present two novel concepts for pilot stages with low power consumption to regulate a pneumatic device. Pilot 1, first concept, is designed based on a conventional frame core electro-magnetic actuator and a leaf spring to control the air flow and pilot 2 has an axisymmetric actuator and spring made of non-oriented electrical steel. Concepts are simulated in a system modeling tool to study their dynamic behavior. Both concepts are prototyped and tested. Experimental results are comprehensively analyzed and compared. The most promising concept that consumes less than 8 mW is highlighted and presented.

Keywords: electro-magnetic actuator, multidisciplinary system, low power consumption, pilot stage

Procedia PDF Downloads 254
5045 Mobile Communication Technologies, Romantic Attachment and Relationship Quality: An Exploration of Partner Attunement

Authors: Jodie Bradnam, Mark Edwards, Bruce Watt

Abstract:

Mobile technologies have emerged as tools to create and sustain social and romantic relationships. The integration of technologies in close relationships has been of particular research interest with findings supporting the positive role of mobile phones in nurturing feelings of closeness and connection. More recently, the use of text messaging to manage conflict has become a focus of research attention. Four hundred and eleven adults in committed romantic relationships completed a series of questionnaires measuring attachment orientation, relationship quality, texting frequencies, attitudes, and response expectations. Attachment orientation, relationship length, texting for connection and disconnection were significant predictors of relationship quality, specifically relationship intimacy. Text frequency varied as a function of attachment orientation, with high attachment anxiety associated with high texting frequencies and with low relationship quality. Sending text messages of love and support was related to higher intimacy and relationship satisfaction scores, while sending critical or impersonal texts was associated with significantly lower intimacy and relationship satisfaction scores. The use of texting to manage relational conflict was a stronger negative predictor of relationship satisfaction than was the use of texting to express love and affection. Consistent with research on face-to-face communication in couples, the expression of negative sentiments via text were related to lower relationship quality, and these negative sentiments had a stronger and more enduring impact on relationship quality than did the expression of positive sentiments. Attachment orientation, relationship length and relationship status emerged as variables of interest in understanding the use of mobile technologies in romantic relationships.

Keywords: attachment, destructive conflict, intimacy, mobile communication, relationship quality, relationship satisfaction, texting

Procedia PDF Downloads 380
5044 Comparing Community Detection Algorithms in Bipartite Networks

Authors: Ehsan Khademi, Mahdi Jalili

Abstract:

Despite the special features of bipartite networks, they are common in many systems. Real-world bipartite networks may show community structure, similar to what one can find in one-mode networks. However, the interpretation of the community structure in bipartite networks is different as compared to one-mode networks. In this manuscript, we compare a number of available methods that are frequently used to discover community structure of bipartite networks. These networks are categorized into two broad classes. One class is the methods that, first, transfer the network into a one-mode network, and then apply community detection algorithms. The other class is the algorithms that have been developed specifically for bipartite networks. These algorithms are applied on a model network with prescribed community structure.

Keywords: community detection, bipartite networks, co-clustering, modularity, network projection, complex networks

Procedia PDF Downloads 620
5043 Determination of Lead , Cadmium, Nickel and Zinc in Some Green Tea Samples Collected from Libyan Markets

Authors: Jamal A. Mayouf, Hashim Salih Al Bayati, Eltayeb M. Emmima

Abstract:

Green tea is one of the most common drinks in all cities of Libyan. Heavy metal contents such as cadmium (Cd), lead (Pb), nickel (Ni) and zinc (Zn) were determined in four green tea samples collected from Libyan market and their tea infusions by using atomic emission spectrophotometry after acid digestion. The results obtained indicate that the concentrations of Cd, Pb, Ni and Zn in tea infusions samples ranged from 0.07-0.12, 0.19-0.28, 0.09-0.15, 0.18-0.43 mg/l after boiling for 5 min., 0.06-0.08, 0.18-0.23, 0.08-0.14, 0.17-0.27 mg/l after boiling for 10 min., 0.07-0.11, 0.18-0.24, 0.08-0.14, 0.21-0.34 mg/l after boiling for 15 min. respectively. On the other hand, the concentrations of the same element mentioned above obtained in tea leaves ranged from 6.0-18.0, 36.0-42.0, 16.0-20.0, 44.0-132.0 mg/kg respectively. The concentrations of Cd, Pb, Ni and Zn in tea leaves samples were higher than Prevention of Food Adulteration (PFA) limit and World Health Organization(WHO) permissible limit.

Keywords: boiling, infusion, metals, tea

Procedia PDF Downloads 391
5042 “In Their Own Words”: An Exploration of the Use of Narratives with Children in Counselling

Authors: Alison Brown

Abstract:

Through stories, children make sense of their world, see themselves through the eyes of another, and process emotions and lived experiences in a non-threatening and indirect manner. Building on research around the use of narrative techniques with adults and families, this research looked directly at the use of narratives as a therapeutic technique with children in counseling. Based on individual therapy sessions with children over a six-year period, this work of collective case studies tells the story of a practice incorporating children’s narratives, of children’s experiences in writing and sharing their narratives, and of the clinical impact of the use of narratives with children. Not all stories were narratives of success or happiness. Children documented their fears and anger as well as their achievements and hope for the future. What emerged through this study was an awareness of recurring themes in the way children responded to the narrative process and in the benefits and limitations of story writing with children. Consistent with previous studies focusing on narrative work with adults and families, the use of narratives with children provided opportunities for healing, acceptance, developing greater understanding, externalizing, and re-authoring a preferred future. In terms of the children’s experiences in writing and sharing their narratives, consistent themes emerged again, with many children finding the experience cathartic and liberating, empowering and hopeful, but most importantly, an opportunity that allowed them to feel and understand that they were not alone. Whilst a small collection of case studies tells the stories of a limited number of children, it is hoped that this research provides both a model and inspiration for others to explore similar uses of narratives with children. As a greater number of children’s narratives are created, the potential to share and benefit from the many rich stories and experiences of other children becomes more of a reality. Across cultures, economic and social settings, rural and urban environments, and varying family structures, it is important that we hear the voices of our children – ‘In their own words’.

Keywords: narrative therapy children counselling, social, emotional, zone of proximal development, scaffolding

Procedia PDF Downloads 90
5041 The Effect of Artificial Intelligence on Banking Development and Progress

Authors: Mina Malak Hanna Saad

Abstract:

New strategies for supplying banking services to the customer have been brought, which include online banking. Banks have begun to recall electronic banking (e-banking) as a manner to replace some conventional department features by means of the usage of the internet as a brand-new distribution channel. A few clients have at least one account at multiple banks and get admission to those debts through online banking. To test their present-day internet worth, customers need to log into each of their debts, get particular statistics, and paint closer to consolidation. Not only is it time-ingesting; however, but it is also a repeatable activity with a certain frequency. To solve this problem, the idea of account aggregation was delivered as a solution. Account consolidation in e-banking as a form of digital banking appears to build stronger dating with clients. An account linking service is usually known as a service that permits customers to manipulate their bank accounts held at exceptional institutions through a common online banking platform that places a high priority on safety and statistics protection. The object affords an outline of the account aggregation approach in e-banking as a distinct carrier in the area of e-banking. The advanced facts generation is becoming a vital thing in the improvement of financial services enterprise, specifically the banking enterprise. It has brought different ways of delivering banking to the purchaser, which includes net Banking. Banks began to study electronic banking (e-banking) as a means to update some of their traditional branch functions and the use of the net as a distribution channel. Some clients have at least multiple accounts throughout banks and get the right of entry to that money owed through the usage of e-banking offerings. To examine the contemporary internet's well-worth position, customers have to log in to each of their money owed, get the information and work on consolidation. This no longer takes sufficient time; however, it is a repetitive interest at a specified frequency. To address this point, an account aggregation idea is brought as an answer. E-banking account aggregation, as one of the e-banking kinds, appeared to construct a more potent dating with clients. Account Aggregation carrier usually refers to a service that allows clients to control their bank bills maintained in one-of-a-kind institutions via a common Internet banking working platform, with an excessive subject to protection and privateness. This paper offers an overview of an e-banking account aggregation technique as a new provider in the e-banking field.

Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise developmente-banking, enterprise development

Procedia PDF Downloads 25
5040 Electability of Stable Insiders’ Coalition Governments

Authors: Tryphon Kollintzas, Lambros Pechlivanos

Abstract:

In this paper, we formulate a general equilibrium theory that explains the existence and stability of democratically elected governments that support certain groups of individuals in society (insiders) to the detriment of everybody else (outsiders), even if the latter constitute a majority. The vehicle is a dynamic general equilibrium model, where insiders get monopoly rents and outsiders get less than what they would have gotten under a common good regime. We construct such political economy equilibria, and we identify the conditions under which such political regimes (coalitions of insiders): (a) can safeguard against opportunistic behavior (i.e., do not fall from within) and (b) may come to power in the first place (i.e., manage to get elected). To that end, we highlight the role of perception manipulation and self-serving bias as a gluing device to garner an electable coalition.

Keywords: insiders, coalition governments, stability, electability, politico-economic equilibrium, perceptions manipulation

Procedia PDF Downloads 61
5039 The Interplay of Factors Affecting Learning of Introductory Programming: A Comparative Study of an Australian and an Indian University

Authors: Ritu Sharma, Haifeng Shen

Abstract:

Teaching introductory programming is a challenging task in tertiary education and various factors are believed to have influence on students’ learning of programming. However, these factors were largely studied independently in a chosen context. This paper aims to investigate whether interrelationships exist among the factors and whether the interrelationships are context-dependent. In this empirical study, two universities were chosen from two continents, which represent different cultures, teaching methodologies, assessment criteria and languages used to teach programming in west and east worlds respectively. The results reveal that some interrelationships are common across the two different contexts, while others appear context-dependent.

Keywords: introductory programming, tertiary education, factors, interrelationships, context, empirical study

Procedia PDF Downloads 359
5038 Designing of Food Products with Seasoned Plant Components Assigned for Obese and Diabetic Individuals

Authors: A. Gramza-Michałowska, J. Skręty, M. Antczak, J. Kobus-Cisowska, D. Kmiecik, J. Korczak, Kulczyński Bartosz

Abstract:

Background: Modern consumer highly appreciates the correlation between eating habits and health. Intensified research showed many proofs confirming that food besides its basic nutritional function, possess also significant prophylactic and therapeutic potential. Preventive potential of selected food is commonly used as improvement factor of patients life standard. World Health Organization indicates that diabetes (Diabetes mellitus) and obesity are two of the most common and dangerous diseases. Diet therapy is an element of diabetes education program and a part of healing process, allowing maintaining and remaining the optimal metabolic state of the system. It must be remembered that diabetes treatment should be individualized to each patient. One of highly recommended vegetable for diabetes is asparagus (Asparagus officinalis L.), low calories common plant, growing in European countries. Objective: To propose the technology of unsweetened muesli production with addition of new components, we investigated the effects of selected vegetable addition on antioxidative capacity and consumer’s acceptance of muesli as representative of breakfast product. Methods: Muesli was formulated from a composition of oat flakes, flaxseed, bran, carrots, broccoli and asparagus. Basic composition of muesli was evaluated as content of protein, lipids, fatty acid composition, ash, selected minerals and caloricity. Antioxidant capacity of muesli was evaluated with use radical scavenging methods (DPPH, ABTS), ORAC value and PCL - photochemiluminescence antiradical potential. Proposed muesli as new product was also characterized with sensory analysis, which included color, scent, taste, consistency and overall acceptance of a product. Results: Results showed that addition of freeze-dried asparagus into muesli allowed to lower the fat content and caloricity of a product according to the base product. No significant loss in antioxidant potential was evaluated, also the sensory value of a product was not negative. Conclusion: Designed muesli would be an answer for obese people looking for healthy snack during the daytime. Results showed that product with asparagus addition would be accepted by the consumers and because of its antidiabetic potential could be a n important factor in prevention of diabetes or obesity. Financial support by the UE Project no PO IG 01.01.00.00-061/09

Keywords: muesli, vegetables, asparagus, antioxidant potential, lipids

Procedia PDF Downloads 314
5037 The Role of Internal and External Control in the Migrant Related Representations of Right-Wing Extremists

Authors: Gabriella Kengyel

Abstract:

This study aims to describe the differences between the attitudes of the right-wing extremists with internal or external control towards migrants. They both have a significantly higher score on Rotter's Locus of Control Scale, and they are quite xenophobic (54%) according to Bogardus Social Distance Scale. Present research suggests their motives are different. Principle components analysis shows that extremists with internal control reject migrants because of welfare chauvinism and they think that there is some kind of political conspirationism behind the European Refugee Crisis. Contrarily extremist with external control believe in a common enemy and they are significantly more ethnocentric and less skeptical in politics. Results suggest that extremist with internal control shows hostility toward minorities and migrants mainly because of their own reference group.

Keywords: control, extremist, migrant, right-wing

Procedia PDF Downloads 271
5036 Rényi Entropy Correction to Expanding Universe

Authors: Hamidreza Fazlollahi

Abstract:

The Re ́nyi entropy comprises a group of data estimates that sums up the well-known Shannon entropy, acquiring a considerable lot of its properties. It appears as unqualified and restrictive entropy, relative entropy, or common data, and has found numerous applications in information theory. In the Re ́nyi’s argument, the area law of the black hole entropy plays a significant role. However, the total entropy can be modified by some quantum effects, motivated by the randomness of a system. In this note, by employing this modified entropy relation, we have derived corrections to Friedmann equations. Taking this entropy associated with the apparent horizon of the Friedmann-Robertson-Walker Universe and assuming the first law of thermodynamics, dE=T_A (dS)_A+WdV, satisfies the apparent horizon, we have reconsidered expanding Universe. Also, the second thermodynamics law has been examined.

Keywords: Friedmann equations, dark energy, first law of thermodynamics, Reyni entropy

Procedia PDF Downloads 91
5035 Graph Clustering Unveiled: ClusterSyn - A Machine Learning Framework for Predicting Anti-Cancer Drug Synergy Scores

Authors: Babak Bahri, Fatemeh Yassaee Meybodi, Changiz Eslahchi

Abstract:

In the pursuit of effective cancer therapies, the exploration of combinatorial drug regimens is crucial to leverage synergistic interactions between drugs, thereby improving treatment efficacy and overcoming drug resistance. However, identifying synergistic drug pairs poses challenges due to the vast combinatorial space and limitations of experimental approaches. This study introduces ClusterSyn, a machine learning (ML)-powered framework for classifying anti-cancer drug synergy scores. ClusterSyn employs a two-step approach involving drug clustering and synergy score prediction using a fully connected deep neural network. For each cell line in the training dataset, a drug graph is constructed, with nodes representing drugs and edge weights denoting synergy scores between drug pairs. Drugs are clustered using the Markov clustering (MCL) algorithm, and vectors representing the similarity of drug pairs to each cluster are input into the deep neural network for synergy score prediction (synergy or antagonism). Clustering results demonstrate effective grouping of drugs based on synergy scores, aligning similar synergy profiles. Subsequently, neural network predictions and synergy scores of the two drugs on others within their clusters are used to predict the synergy score of the considered drug pair. This approach facilitates comparative analysis with clustering and regression-based methods, revealing the superior performance of ClusterSyn over state-of-the-art methods like DeepSynergy and DeepDDS on diverse datasets such as Oniel and Almanac. The results highlight the remarkable potential of ClusterSyn as a versatile tool for predicting anti-cancer drug synergy scores.

Keywords: drug synergy, clustering, prediction, machine learning., deep learning

Procedia PDF Downloads 72
5034 Frequent Pattern Mining for Digenic Human Traits

Authors: Atsuko Okazaki, Jurg Ott

Abstract:

Some genetic diseases (‘digenic traits’) are due to the interaction between two DNA variants. For example, certain forms of Retinitis Pigmentosa (a genetic form of blindness) occur in the presence of two mutant variants, one in the ROM1 gene and one in the RDS gene, while the occurrence of only one of these mutant variants leads to a completely normal phenotype. Detecting such digenic traits by genetic methods is difficult. A common approach to finding disease-causing variants is to compare 100,000s of variants between individuals with a trait (cases) and those without the trait (controls). Such genome-wide association studies (GWASs) have been very successful but hinge on genetic effects of single variants, that is, there should be a difference in allele or genotype frequencies between cases and controls at a disease-causing variant. Frequent pattern mining (FPM) methods offer an avenue at detecting digenic traits even in the absence of single-variant effects. The idea is to enumerate pairs of genotypes (genotype patterns) with each of the two genotypes originating from different variants that may be located at very different genomic positions. What is needed is for genotype patterns to be significantly more common in cases than in controls. Let Y = 2 refer to cases and Y = 1 to controls, with X denoting a specific genotype pattern. We are seeking association rules, ‘X → Y’, with high confidence, P(Y = 2|X), significantly higher than the proportion of cases, P(Y = 2) in the study. Clearly, generally available FPM methods are very suitable for detecting disease-associated genotype patterns. We use fpgrowth as the basic FPM algorithm and built a framework around it to enumerate high-frequency digenic genotype patterns and to evaluate their statistical significance by permutation analysis. Application to a published dataset on opioid dependence furnished results that could not be found with classical GWAS methodology. There were 143 cases and 153 healthy controls, each genotyped for 82 variants in eight genes of the opioid system. The aim was to find out whether any of these variants were disease-associated. The single-variant analysis did not lead to significant results. Application of our FPM implementation resulted in one significant (p < 0.01) genotype pattern with both genotypes in the pattern being heterozygous and originating from two variants on different chromosomes. This pattern occurred in 14 cases and none of the controls. Thus, the pattern seems quite specific to this form of substance abuse and is also rather predictive of disease. An algorithm called Multifactor Dimension Reduction (MDR) was developed some 20 years ago and has been in use in human genetics ever since. This and our algorithms share some similar properties, but they are also very different in other respects. The main difference seems to be that our algorithm focuses on patterns of genotypes while the main object of inference in MDR is the 3 × 3 table of genotypes at two variants.

Keywords: digenic traits, DNA variants, epistasis, statistical genetics

Procedia PDF Downloads 116
5033 Sukuk Issuance and Its Regulatory Framework in Saudi Arabia

Authors: Ali Alshamrani

Abstract:

This article aims to give a comprehensive and critical review of sukuk issuance in Saudi Arabia, and the extent to which the issuance of sukuk in Saudi Arabia is consistent with Shariah requirements. The article is divided into two sections. Accordingly, the first section of this article begins with an examination of sukuk in general, and includes the concept of sukuk, the basic principles of sukuk, common types of sukuk, and a critical analysis of the most important differences between sukuk and conventional bonds. The second section gives a critical analysis of how sukuk work in Saudi Arabia, offering the regulatory framework of the issuance of sukuk in the KSA, and the legal challenges from Shariah point of view, and provide recommendations to overcome these challenges.

Keywords: sukuk issuance, Shariah, Saudi Arabia, capital market authority

Procedia PDF Downloads 465
5032 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation

Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han

Abstract:

As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.

Keywords: actuator, user authentication, security evaluation, haptic actuator

Procedia PDF Downloads 341
5031 Tourism Development Analysis According to Offer Improvements: Case of Crikvenica

Authors: Josip Arneric, Antonio Sostaric

Abstract:

Crikvenica is one of the favourite tourist destinations at the Adriatic Sea in Croatia which attracts guests with its natural beauties and is one of the top destinations with the highest number of overnights stays. The main purpose of this research is to determine which elements of tourist offer should be improved to achieve sustainable development of the town of Crikvenica. Namely, the survey results from a random sample have shown that the most common reason of the visits is relaxation and vacation, and that more attention should be given to the following categories: restaurants and the working hours of stores and banks. We have also examined whether or not there is a correlation between an average daily expenditure and the overnight stay. The paper ends with the conclusion and the recommendations on how to improve the tourist offer of Crikvenica in order to increase guest satisfaction and to keep its reputation at a high level.

Keywords: tourism development, survey, Crikvenica, management sciences

Procedia PDF Downloads 366
5030 Thyroid Cancer Treatment in Yemen Under Blockade Conditions and Absence of Radioactive Iodine

Authors: Anis Al-Yakhiri

Abstract:

Introduction: The World Health Organization (WHO) classifies malignant epithelial thyroid tumors into four major groups (papillary, follicular, medullar and undifferentiated) . Papillary thyroid carcinoma (PTC) is the most common type, for about eight out of ten thyroid cancers belong to this histological type. Radioactive iodine (RAI) is considered effective for patients with total or nearly total thyroidectomy, but the beneficial effects of RAI are still controversial. War conditions forced us to study alternative methods of using radioactive iodine in the treatment of patients with PTC. Material and methods: Between January 2014 and June 2021, in Al-Yakhiri hospital, 57 Total Thyroidectomy with Radical BilateralNeckDissection (RBND) were performed, 50 for malignant disease,7 for false positive cytology.RBND involves surgical clearance of Levels II-VI. Mean age was 40.7 years old and 92% of the patients were female. 7(14%) patients had hypothyroidism which required preoperative thyroid hormone treatment. The Thyroid Stimulating Hormone- Suppression Therapy (TSH-ST) immediately started after RBND for mostpatients on the first day. It consisted in reducing the level of TSH< 0.1 mIU/L. Results: The Apron flap was used on most operations (40)80% and with lateral extensions had 10(20%). RBND involves surgical clearance of Levels II-VI performed in all operated patients, besides that, 4(8%) of them had resection of sternocleidomastoid muscle (SCM) and accessory nerve (XIn) and internal jugular vein (IJV) withclearance of Levels IB. The PTC was the most common 80.9% (38 patients from 47)by histopathological report. and 4(8%) patients of 50 had resection of sternocleidomastoid muscle (SCM) and accessory nerve (XIn) and internal jugular vein (IJV). The postoperative mortality rate not observed (0%). The postoperative morbidity rate was 22.8% (n =13).Seroma(8.7%),Hypocalcimia(7%), Wound infection(5.3%), Bleeding(1.8%). To suppress TSH and growth of any residual thyroid theTSH-ST (levothyroxine150 – 600mcg)was performed in all patients 57(100%) on the first day afterRBND. We tracked the results of treatment for two years in 30 patients with PTC, only 3 of them received radioactive iodine abroad. Biennial Recurrence rate for PTC appeared in one woman (2%), who had RAI postoperatively in the form of neck lymph nodes metastasis. Conclusion: For patients with PTC, thyroidectomy plus prophylacticRBND is a safe and efficient procedure and it results in lower recurrence rate. Postoperative treatment with exogenous thyroid hormone in doses sufficient to suppress TSH (not less than 150mcg), decreases incidence of recurrence. Total Thyroidectomy with RBND followed by TSH-ST, in our opinion, applicable optimal treatment scheme care for this patient population.

Keywords: thyroid cancer, Yemen war, absence of radioactive iodine, neck dissection, surgery results

Procedia PDF Downloads 72
5029 An Exploration of Cyberspace Security, Strategy for a New Era

Authors: Laxmi R. Kasaraneni

Abstract:

The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.

Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security

Procedia PDF Downloads 292
5028 An Exploration of Architecture Design Methods in Urban Fringe Belt Based on Typo-Morphological Research- A Case of Expansion Project of the Second Middle School in Xuancheng, China

Authors: Dong Yinan, Zhou Zijie

Abstract:

Urban fringe belt is an important part of urban morphology research. Different from the relatively fixed central district of city, the position of fringe belt is changing. In the process of urban expansion, the original fringe belt is likely to be merged by the new-built city, even become new city public center. During the change, we are facing the dialectic between restoring the organicity of old urban form and creating new urban image. There are lots of relevant research in urban scale, but when we focus on building scale, rare design method can be proposed, thus some new individual building cannot match the overall urban planning intent. The expansion project of the second middle school in Xuancheng is facing this situation. The existing campus is located in the south fringe belt of Xuancheng, Anhui province, China, adjacent to farmland and ponds. While based on the Xucheng urban planning, the farmland and ponds will be transformed into a big lake, around which new public center will be built; the expansion of the school becomes an important part of the boundary of the new public center. Therefore, the expansion project faces challenges from both urban and building scale. In urban scale, we analyze and summarize the fringe belt characters through the reading of existing and future urban organism, in order to determine the form of the expansion project. Meanwhile, in building scale, we study on different types of school buildings and select appropriate type which can satisfy to both urban form and school function. This research attempts to investigate design methods based on an under construction project in Xuancheng, a historic city in southeast China. It also aims to bridge the gap from urban design to individual building design through the typo-morphological research.

Keywords: design methods, urban fringe belt, typo-morphological research, middle school

Procedia PDF Downloads 496
5027 Mathematical Modelling of Different Types of Body Support Surface for Pressure Ulcer Prevention

Authors: Mahbub C. Mishu, Venktesh N. Dubey, Tamas Hickish, Jonathan Cole

Abstract:

Pressure ulcer is a common problem for today's healthcare industry. It occurs due to external load applied to the skin. Also when the subject is immobile for a longer period of time and there is continuous load applied to a particular area of human body,blood flow gets reduced and as a result pressure ulcer develops. Body support surface has a significant role in preventing ulceration so it is important to know the characteristics of support surface under loading conditions. In this paper we have presented mathematical models of different types of viscoelastic materials and also we have shown the validation of our simulation results with experiments.

Keywords: pressure ulcer, viscoelastic material, mathematical model, experimental validation

Procedia PDF Downloads 306
5026 Insulation Properties of Rod-Plane Electrode Covered with ATH/SIR Nano-Composite in Dry-Air

Authors: Jae-Yong Sim, Jung-Hun Kwon, Ji-Sung Park, Kee-Joe Lim

Abstract:

One of the latest trends for insulation systems to improve the insulation performance is the use of eco-friendly hybrid insulation using compressed dry-air. Despite the excellent insulation performance of sulphurhexafluoride (SF6) gas, its use has been restricted due to the problems with significant global warming potential (GWP). Accordingly, lightning impulse performance of the hybrid insulation system covered with an aluminum trihydrate/silicone rubber (ATH/SIR) nanocomposite was examined in air at atmospheric pressure and in compressed air at pressures between 0.2 and 0.6 MPa. In the experiments, the most common breakdown path took place along the surface of the covered rod. The insulation reliability after several discharges should be guaranteed in hybrid insulation. On the other hand, the surface of the covered rod was carbonized after several discharges. Therefore, nanoscale ATH can be used as a reinforcement of covered dielectrics to inhibit carbonization on the surface of a covered rod. The results were analyzed in terms of the surface resistivity of the cover dielectrics.

Keywords: nanocomposite, hybrid insulation, ATH, dry-air

Procedia PDF Downloads 446
5025 An Empirical Exploration of Factors Influencing Lecturers' Acceptance of Open Educational Resources for Enhanced Knowledge Sharing in North-East Nigerian Universities

Authors: Bello, A., Muhammed Ibrahim Abba., Abdullahi, M., Dauda, Sabo, & Shittu, A. T.

Abstract:

This study investigated the Predictors of Lecturers Knowledge Sharing Acceptance on Open Educational Resources (OER) in North-East Nigerian in Universities. The study population comprised of 632 lecturers of Federal Universities in North-east Nigeria. The study sample covered 338 lecturers who were selected purposively from Adamawa, Bauchi and Borno State Federal Universities in Nigeria. The study adopted a prediction correlational research design. The instruments used for data collection was the questionnaire. Experts in the field of educational technology validated the instrument and tested it for reliability checks using Cronbach’s alpha. The constructs on lecturers’ acceptance to share OER yielded a reliability coefficient of; α = .956 for Performance Expectancy, α = .925; for Effort Expectancy, α = .955; for Social Influence, α = .879; for Facilitating Conditions and α = .948 for acceptance to share OER. the researchers contacted the Deanery of faculties of education and enlisted local coordinators to facilitate the data collection process at each university. The data was analysed using multiple sequential regression statistic at a significance level of 0.05 using SPSS version 23.0. The findings of the study revealed that performance expectancy (β = 0.658; t = 16.001; p = 0.000), effort expectancy (β = 0.194; t = 3.802; p = 0.000), social influence (β = 0.306; t = 5.246; p = 0.000), collectively indicated that the variables have a predictive capacity to stimulate lecturer’s acceptance to share their resources on OER repository. However, the finding revealed that facilitating conditions (β = .053; t = .899; p = 0.369), does not have a predictive capacity to stimulate lecturer’s acceptance to share their resources on OER repository. Based on these findings, the study recommends among others that the university management should consider adjusting OER policy to be centered around actualizing lecturers career progression.

Keywords: acceptance, lecturers, open educational resources, knowledge sharing

Procedia PDF Downloads 64